电信科学 ›› 2017, Vol. 33 ›› Issue (10): 71-80.doi: 10.11959/j.issn.1000-0801.2017241

• 研究与开发 • 上一篇    下一篇

面向“互联网+”的公有云数据安全

王永建1,宋爱波1,叶亚伟2,姜海波3   

  1. 1 东南大学计算机科学与工程学院,江苏 南京 211189
    2 中国通信建设集团设计院有限公司,北京 100079
    3 国网河南省电力公司检修公司,河南 郑州 450052
  • 修回日期:2017-10-11 出版日期:2017-10-01 发布日期:2017-11-13
  • 作者简介:王永建(1981-),男,东南大学计算机科学与工程学院博士生,主要研究方向为云安全、大数据处理。|宋爱波(1970-),男,博士,东南大学计算机科学与工程学院教授、博士生导师,主要研究方向为云计算、大数据处理。|叶亚伟(1981-),男,中国通信建设集团设计院有限公司工程师,主要研究方向为云计算。|姜海波(1981-),男,国网河南省电力公司检修公司高级工程师,主要研究方向为电网系统数据安全。
  • 基金资助:
    国家自然科学基金资助项目(61173138)

Data security for internet plus in public cloud

Yongjian WANG1,Aibo SONG1,Yawei YE2,Haibo JIANG3   

  1. 1 School of Computer Science and Engineering,Southeast University,Nanjing 211189,China
    2 China International Telecommunication Construction Group Design Institute Co.,Ltd.,Beijing 100079,China
    3 State Grid Henan Electric Power Company Maintenance Company,Zhengzhou 450052,China
  • Revised:2017-10-11 Online:2017-10-01 Published:2017-11-13
  • Supported by:
    The National Natural Science Foundation of China(61173138)

摘要:

“互联网+”催生了许多新的经济形态与商业模式,公有云面临着严峻的安全挑战。研究了公有云数据安全问题,并提出了研究思路。首先,分析了同态加密的概念、加法同态加密与乘法同态加密的特点以及当前的研究成果和需要解决的难题。然后,根据乘法同态加密算法、散列表和相似性理论,提出了一种数据安全保护方案,并阐述了具体实现流程,采用欧氏距离检验公有云中加密数据的相似性与完整性。最后,理论分析了该方案的正确性与安全性。仿真实验验证了该方案的可行性与有效性。

关键词: 公有云, 同态加密, 散列表, 相似性, 欧氏距离

Abstract:

“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.

Key words: public cloud, homomorphic encryption, hash table, similarity, Euclidean distance

中图分类号: 

No Suggested Reading articles found!